eriknl / CVE-2020-16152Links
Explanation and PoC for CVE-2020-16152
☆11Updated 4 years ago
Alternatives and similar repositories for CVE-2020-16152
Users that are interested in CVE-2020-16152 are comparing it to the libraries listed below
Sorting:
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Updated 5 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 5 years ago
- Concept:☆11Updated 3 years ago
- PoC CVE-2020-6308☆36Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- ☆21Updated 5 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- Cobalt Strike Aggressor Scripts are custom penetration testing and red teaming scripts for use with Cobalt Strike.☆8Updated 6 years ago
- Alternative Mimikatz LSASS DUMPER☆12Updated 5 years ago
- Use current thread token to execute command☆15Updated 4 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 4 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆33Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- Python exploit of cve-2020-7247☆25Updated 5 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Updated 5 years ago
- CVE-2020-14882 Weblogic-Exp☆17Updated 4 years ago
- SyscallLoader☆11Updated 3 years ago
- Show AV Processes list☆14Updated 4 years ago
- CVE-2020-3452 exploit☆24Updated 4 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- ☆20Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week